CVE-2015-8263
 
Severity Score
8.6
*CVSS v3
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
NETGEAR WNR1000v3 devices with firmware 1.0.2.68 use the same source port number for every DNS query, which makes it easier for remote attackers to spoof responses by selecting that number for the destination port.
Dispositivos NETGEAR WNR1000v3 con firmware 1.0.2.68 utilizan el mismo número de puerto origen para cada consulta DNS, lo que facilita a atacantes remotos suplantar respuestas seleccionando ese número para el puerto de destino.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2015-11-19 CVE Reserved
- 2015-12-27 CVE Published
- 2024-03-28 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/78873 | Vdb Entry | |
https://www.kb.cert.org/vuls/id/403568 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Netgear Search vendor "Netgear" | Wnr1000v3 Firmware Search vendor "Netgear" for product "Wnr1000v3 Firmware" | 1.0.2.68 Search vendor "Netgear" for product "Wnr1000v3 Firmware" and version "1.0.2.68" | - |
Affected
| in | Netgear Search vendor "Netgear" | Wnr1000v3 Search vendor "Netgear" for product "Wnr1000v3" | * | - |
Affected
|